CompTIA Cloud+

Instructor:

Toby Skandier

Course Description

The CompTIA Cloud+ certification validates the knowledge required of IT practitioners working in cloud-computing environments. This course is delivered over the span of five days to equip you with the skills necessary to recognize standard cloud terminology as well as to implement, maintain, and deliver cloud technologies and infrastructures, including servers, networking, storage, and virtualization. Furthermore, you will learn about IT security and industry best-practices as they relate to cloud implementations and virtualization. It’s helpful for those taking this class to have experience in networking. A prior Network+ or Storage+ certification is helpful, but not required.

Cloud Concepts and Models

Course Introduction

Introduction :: Part 1

Introduction :: Part 2

Compare and Contrast Cloud Services

Cloud Services :: Part 1

Cloud Services :: Part 2

Compare and Contrast Cloud Delivery Models and Services

Cloud Delivery Model & Services :: Part 1

Cloud Delivery Model & Services :: Part 2

Cloud Delivery Model & Services :: Part 3

Summarize cloud characteristics and terms

Cloud Characteristics & Terms :: Part 1

Cloud Characteristics & Terms :: Part 2

Explain object storage concepts

Object Storage Concepts

Virtualization

Explain the differences between hypervisor types

Differences Between Hypervisor Types :: Part 1

Differences Between Hypervisor Types :: Part 2

Install, configure, and manage virtual machines and devices

Install, Configure, Manage Virtual Machines & Devices :: Part 1

Install, Configure, Manage Virtual Machines & Devices :: Part 2

Given a scenario, perform virtual resource migration

Virtual Resource Migration

Explain the benefits of virtualization in a cloud environment

Benefits of Virtualization in a Cloud Environment

Compare and contrast virtual components used to construct a cloud environment

Virtual Components used to Construct a Cloud Environment :: Part 1

Virtual Components used to Construct a Cloud Environment :: Part 2

Infrastructure

Compare and contrast various storage technologies

Various Storage Technologies :: Part 1

Various Storage Technologies :: Part 2

Explain storage configuration concepts

Storage Configuration Concepts

Execute storage provisioning

Storage Provisioning

Given a scenario, implement appropriate network configurations

Implementing Network Configurations :: Part 1

Implementing Network Configurations :: Part 2

Implementing Network Configurations :: Part 3

Explain the importance of network optimization

Importance of Network Optimization :: Part 1

Importance of Network Optimization :: Part 2

Given a scenario, troubleshoot basic network connectivity issues

Troubleshoot Basic Network Connectivity Issues :: Part 1

Troubleshoot Basic Network Connectivity Issues :: Part 2

Troubleshoot Basic Network Connectivity Issues :: Part 3

Explain common network protocols, ports, and topologies

Common Network Protocols, Ports, & Topologies :: Part 1

Common Network Protocols, Ports, & Topologies :: Part 2

Explain common hardware resources and features used to enable virtual environments

Common Hardware Resources & features used to Enable Virtual Environments

Resource Management

Given a scenario, implement and use proper resource monitoring techniques

Implement & Use Proper Resource Monitoring Techniques :: Part 1

Implement & Use Proper Resource Monitoring Techniques :: Part 2

Given a scenario, appropriately allocate physical (host) resources using best practices

Appropriately Allocate Physical (Host) Resources using Best Practices

Given a scenario, appropriately allocate virtual (guest) resources using best practices

Appropriately Allocate Virtual (Guest) Resources using Best Practices

Given a scenario, use appropriate tools for remote access

Tools for Remote Access :: Part 1

Security

Explain network security concepts, tools, and best practices

Network Security Concepts & Tools :: Part 1

Network Security Concepts & Tools :: Part 2

Explain storage security concepts, methods, and best practices

Security Concepts & Methods

Compare and contrast different encryption technologies and methods

Encryption Technologies & Methods :: Part 1

Encryption Technologies & Methods :: Part 2

Identify access control methods

Access Control Methods

Implement guest and host hardening techniques

Guest & Host Hardening Techniques :: Part 1

Guest & Host Hardening Techniques :: Part 2

Given a scenario, use appropriate tools for remote access :: Part 2

Tools for Remote Access :: Part 2

Systems Management

Given a scenario, diagnose, remediate and optimize physical host performance

Diagnose, Remediate & Optimize Physical Host Performance :: Part 1

Diagnose, Remediate & Optimize Physical Host Performance :: Part 2

Diagnose, Remediate & Optimize Physical Host Performance :: Part 3

Explain common performance concepts as they relate to the host and the guest

Common Performance Concepts as they Relate to the Host & the Guest :: Part 1

Common Performance Concepts as they Relate to the Host & the Guest :: Part 2